Thursday, September 23 2021

On the heels of a global wave of cyberattacks that exploit zero-day vulnerabilities in Microsoft Exchange, the software giant has released a one-click mitigation tool to protect Exchange Servers.

Cyberattacks exploiting four vulnerabilities targeted email systems of hundreds of thousands of organizations globally, including the European Banking Association and Norway’s parliament, the Storting, among other victims. Earlier this month, Microsoft attributed the attack to Chinese state-sponsored hacking group Hafnium.

Conditions required for exploitation of the zero-day include user accounts on the vulnerable system, according to Ilia Kolochenko, chief architect of ImmuniWeb, a Switzerland-based application security firm. Kolochenko raised questions involving the timing of the EBA intrusion and its detection.

Kolochenko said hardening systems and continuous monitoring for network anomalies could have prevented exploitation or enabled detection by the EBA in a timely manner if the intrusion occurred prior to public disclosure of the vulnerability. “If the intrusion had happened after the disclosure, but prior to the emergency patch, the vulnerable systems should have been immediately disconnected to prevent exploitation in the wild,” he said.

Dr. Oren Eytan, chief executive at content disarm and reconstruction platform Odix, said attackers expend “substantial efforts” on penetration of large enterprises and financial institutions. The wide distribution of Microsoft Exchange Servers globally, particularly at such institutions, makes them excellent targets for attackers.

The sizable amount of source code makes discovery of a vulnerability a relatively high likelihood for threat actors. Considering these factors, Eytan warned that the next attack is “only a question of time.”

Given the proliferation of supply chain attacks, how do you protect your organization? The recent attacks underscore the importance of timing and the risk recovery plan that affords the most resilience once the breach has occurred. What steps can leadership take to ensure the proper balance between prevention and recovery at their organizations?

Expertise: Cyber risks change and evolve regularly. An expert grasp of the latest data threats and how they might target your vulnerabilities can alert you to blind spots in your prevention and recovery strategies. Headcount dedicated to cyber expertise is an investment in the protection of your data, and of your reputation. Your shareholders, customers, and employees need to feel safe putting their personal information in your care. Embed this expertise in your org chart and recruitment/development plan.

Layered recovery plan: Data breaches can take three forms: data extraction, data corruption, and loss of access to data. To effectively construct a cybersecurity strategy, CEOs and boards need to require a business impact analysis wherein CISOs create scenarios for each of type of breach and document a plan to swiftly address each threat if it occurs. To be effective, roles and responsibilities need to be clearly defined, and the plan must include communications strategies and tactics for internal and external audiences. “Real time” is no time to be processing, addressing, and communicating the impact of a breach.

Continuous assessment: Cybersecurity is not a “set it and forget it” thing. As cyber risks change and increase, the plan will require stringent review, testing, and evaluating the ability of the entity to survive a breach. In large organizations, this involves cross-functional teams to ensure that potential impacts to various businesses, operations, and audiences are fully understood and accounted for. Clear metrics for successful recovery are essential to assessing the plan and the ROI.

Keeping up with cybersecurity may seem like a perpetual game of Whac-A-Mole but, like many cyber versions of older analog games, the player who is most adept at exploiting the latest version’s hacks and adding a few surprises has the best chance at winning.

Reporting by Carol McGall; editing by Jeremy Seth Davis.

Previous

Be a Cyber Risk Superhero

Next

The Role of a Cyber Security Analyst

Check Also

Widget

Don’t Miss

Cyber Deal Update: Upstream Security, Hunters, build.security

Khushi Arora

Upstream Security and Hunters complete Series C and Series A funding rounds, respectively. Elastic NV acquires build.security. Funding Upstream Security, an Israeli provider of automotive cybersecurity and a data analytics platform for connected vehicles, has closed a $62 million Series C funding round led by Mitsui Sumitomo Insurance, along with new investors I.D.I. Insurance, NextGen […]

Cyber Deal Update: Loop Secure, Intelligent Automation, Blumira

Khushi Arora

Tesserent acquires Loop Secure to complement its own services, and BlueHalo merges with Intelligent Automation. Blumira completes a Series A funding round. Mergers and Acquisitions Tesserent, an Australian network security company, has announced its intent to acquire Loop Secure, a provider of managed security services, governance risk and compliance, and offensive security services also based […]

Cyber Deal Update: FHIRBlocks, InfoSum

Khushi Arora

Healthcare cybersecurity company ConsenSys Health acquires FHIRBlocks. InfoSum and Monte Carlo close a Series B and Series C funding round, respectively. Mergers and Acquisitions Otava, a Michigan-headquartered cloud solutions provider, has announced its acquisition of NewCloud Networks, a Colorado-based cloud computing services provider. The acquisition provides Otava a product portfolio that includes security services, cloud […]

Cyber Deal Update: Carve Systems, Baffle, Certik

Khushi Arora

iVision acquires Carve Systems, Baffle closes a Series B funding round, and CertiK closes adds to its Series B funding round announced last month. Mergers and Acquisitions iVision, a Georgia-based provider of IT infrastructure and application solutions, has acquired Carve Systems, a New York-based cybersecurity company that provides security testing, security engineering, and security strategy […]

Cyber Executive Moves: Aegon Asset Management, Tego Cyber

Khushi Arora

Aegon Asset Management hires former COO of MN and Tego Cyber gains a new CISO. Aegon Asset Management, based in The Netherlands, has appointed Nicole Grootveld-Sandig as its chief technology officer. Grootveld-Sandig joins Aegon from the Dutch specialist pensions management company MN NV. Tego Cyber, a Nevada-based developer of cyber threat intelligence solutions, has hired […]

Cyber Deal Update: Appriss Insights, Espagon

Khushi Arora

Equifast acquires data analytics company Appriss Insights, while Cisco acquires observability provider Espagon. Mergers and Acquisitions Equifax, an Atlanta-based global data, analytics and technology company, has announced its acquisition of Appriss Insights, a Kentucky-based information technology company providing customized solutions to enhance security and financial processes for businesses, for $1.825 billion. “We are extending the […]